InfoSec Awareness Crossword Puzzle
Across
- 1. Protocol that is meant for uploading and downloading files.
- 4. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- 7. A bundle of programs that is designed to bombard users with advertisements.
- 8. A computer program that keeps a log of your keystrokes on your keyboard.
- 12. a cyber attack intended to redirect a website's traffic to another, fake site.
- 13. The process by which two information systems establish a communication channel.
Down
- 2. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
- 3. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
- 5. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- 6. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
- 9. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- 10. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
- 11. A bunch of several Internet-connected devices that is infectious and controlled by a specific type of malware.
- 12. A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.